SuggestSoft.com

Crypt

M2Crypto Installer for Python 2.3 0.13.1

No Image Crypto is an open source Python cryptography and SSL toolkit. This product is an installer for M2Crypto which installs the M2Crypto source and DLLs into your Python installation. Python is a popular object-oriented programming language that combines remarkable power with very clean syntax. Python is used in business, high-tech, science, education, government and many other fields. M2Crypto offers the Python programmer the following: - RSA, DSA, DH






No Image
PowerKey 2.0

cryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a file with the extension .pkey as output. You

3des, encrypt, cast, blowfish, wipe, encryption, gost, security, anti spy, shell, fast





P-Encrypt Secure Drive 1.2.2.3: P-Encrypt Secure Drive is a program that can create encrypted disk drives.
P-Encrypt Secure Drive 1.2.2.3

crypt Secure Drive (PESD) is a program that can create virtual encrypted disk drives. These encrypted images can be connected to a windows drive letter. PESD is available for Microsoft Windows 2000, XP, and Vista. PESD uses the most trusted and acceptable encryption algorithms available today, which include AES, Blowfish, Twofish, TripleDES, and Camellia. With PESD you can access your encrypted data directly from any program. PESD includes a powerful

crypt, disguise, hide, encryption, privacy



abylon ENTERPRISE 6.3: Innovative and professional security and encryption solution
abylon ENTERPRISE 6.3

cryption algorithm AES and Blowfish guarantee the security of the files. abylon SYMM CRYPT and abylon HYBRID CRYPT are a context sensitive PlugIn for the File Explorer and allow the encryption from files with the right mouse menu. The abylon KEYSAFE allow the protection from all passwords and access data with one secret. The container-based abylon CRYPTDRIVE is shown as own drive and allow the encrypted storing of files and programs. The module abylon

virtual drive, mapi, encode, coding, email, crypt, utilities, pkcs, digital envelop, attachment, cookies, history, deleting



abylon ENTERPRISE 9.50.7: Innovative and professional security and encryption solution
abylon ENTERPRISE 9.50.7

cryption algorithm AES and Blowfish guarantee the security of the files. abylon SYMM CRYPT and abylon HYBRID CRYPT are a context sensitive PlugIn for the File Explorer and allow the encryption from files with the right mouse menu. The abylon KEYSAFE allow the protection from all passwords and access data with one secret. The container-based abylon CRYPTDRIVE is shown as own drive and allow the encrypted storing of files and programs. The module abylon

virtual drive, mapi, encode, coding, email, crypt, utilities, pkcs, digital envelop, attachment, cookies, history, deleting



HIME: Huge Integer Math and Encryption 2.05.1: Encryption functions (public key/ secret key) and huge integer math functions
HIME: Huge Integer Math and Encryption 2.05.1

cryption library. - A cryptography toolkit for Windows with public key and secret key encryption, data security and digital signatures with one-way secure hash functions. - Public (asymmetric) key encryption and digital signatures with RSA. Optional PKCS#1 v1.5 RSA padding. - Secret (symmetric) key encryption with AES (Rijndael) or ArcFour (RC4 compatible). - Hash functions: SHA-512, SHA-256, SHA-1, MD5, CRC32. - FIPS 198 HMAC. - Huge prime number

diffie hellman, public key encryption, securely erase files, digital signature, secret key encryption, library, encryption, compression, sha 1, arbitrary precision, multiple precision, zlib, sha 256



No Image
DLOCK2 2.01

DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm are included. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line and author contact information has been updated. The encryption key may be a passphrase on the command line or it may be contained in a file.

diamond2, encryption, crypto, dlock, dlock2, cryptography, security, file management, utility, diamond


More Results: 1  2  3  4  5  6  

World IT News